Chapter 6. Defensible Data Collection Techniques in the Enterprise
Solutions in this chapter:
▪ “A Day in the Life”: Defining the Enterprise
▪ What Does Defensible Mean?
▪ The Defensible Protocol: Considerations in Planning
▪ Defensible Tools: How Will You Collect?
▪ Collecting Data from Database or other Structured Systems
▪ Defensible People: Consultants, IT, Custodians, Oh My!
Summary
Solutions Fast Track
Frequently Asked Questions

Introduction

Dnzzzzz Dnzzzzz
Dnzzzzz Dnzzzzz
Jane's BlackBerry has been buzzing relentlessly for the past 15 minutes. Her husband, George, has been trying to wake her, but she keeps insisting he's dreaming. Finally, Jane stumbles from bed to her programmable coffee machine and a fresh cup of coffee. “Now, there, at least, ...

Get E-discovery: Creating and Managing an Enterprisewide Program now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.